$ ./exploit.py
[+] Opening connection to ctf.makerforce.io

              Geekcamp
           _       _  ____ _____ _____
 _ __ ___ (_)_ __ (_)/ ___|_   _|  ___|
| '_ ` _ \| | '_ \| | |     | | | |_
| | | | | | | | | | | |___  | | |  _|
|_| |_| |_|_|_| |_|_|\____| |_| |_|

       Organised by OSI Layer 8

Contest begins at 0945 and ends at 1800

Enter your name: Oh no, I’ve been exploited :(
[*] Switching to interactive mode
$ whoami
root
$ cat /flag.txt
miniCTF{web_pwn_re_and_other_puzzles}
$ ^D
[*] Closed connection to ctf.makerforce.io

What is miniCTF?

Held at GeekcampSG 2019, the miniCTF is a "Jeopardy" style individual CTF organized by OSI Layer 8. We have crafted 15 (with more coming soon!) easy to hard challenges in these topics:

  • Web
  • Pwn
  • Reverse Engineering
  • Misc. Puzzles

What are CTFs?

CTF stands for capture the flag. They are a series of challenges with varying difficulty that you need to solve. Most challenges first involve breaking in to (intentionally) badly written code to gain access to the entire system, followed by extracting a "flag" found on the system. Learn more (video)

Getting Started

  1. Read the rules.
  2. Register an account for yourself on this platform.
  3. All challenges and hints are released at 0945. Log in to view and solve them.
  4. The top participants will be announced during the GeekcampSG closing ceremony.

Most challenges can be solved with a web brower, debugger, disassembler or Python. Personally, we like using pwntools to make binary exploitation easier, and HTTPie to synthesize HTTP requests.

The flag format follows the RegEx miniCTF{.+}. Submit the entire flag including miniCTF{}.

NEW! Solving unsolved challenges may give you more points!

Rules

IMPORTANT! Read this before you start

  1. Do not attack any other addresses or ports.
  2. Do not use brute forcing tools or perform denial of service attacks.
  3. Play fair, don't share flags and solutions until the scoreboard is frozen.
  4. Clarify with us if in doubt. You can find us in the blue OSI Layer 8 shirts.

Who is OSI Layer 8?

We're a CTF team that began at NUS High School. We've participated in some CTFs and occasionally organise some.

The coreteam, from left to right: